Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

12:45 PM
Sara Peters
Sara Peters
Products and Releases
Connect Directly

Acalvio Technologies Secures Investment from GV

GV (formerly Google Ventures) Joins Accel Ventures, Ignition Partners, Eileses Capital and Splunk, Bringing Total Investment in the Company to $22M

Santa Clara, Calif. – November 3, 2016 – Acalvio™ Technologies, an innovator in Advanced Threat Defense, today announced that it has received an investment from GV (formerly Google Ventures). GV joins a prestigious group of investors, including Accel Ventures, Ignition Partners, Eileses Capital and Splunk. GV’s investment will accelerate deployment and adoption of Acalvio’s Deception 2.0 technology, which leverages dynamic deception and data science to deliver timely, high fidelity and cost-effective detection solutions, extending it to Internet of Everything (IoE) and cloud environments.

"Acalvio has developed highly differentiated, scalable deception technology that produces better detection and detailed attack analysis than traditional deception technology,” said Tyson Clark, Partner at GV. “As hacks and data breaches become increasingly prevalent, CISOs are taking a more holistic view of security architectures. Acalvio is well positioned in this market as companies deploy next-generation deceptive response technology as part of their core security strategies.”

Acalvio’s Deception 2.0 solution leverages its patented Fluid Deception™ technology to enable authentic and cost-effective deception at scale, which can now be delivered in a DevOps model. In addition, it allows for full engagement with threats to study attack tactics and tools. Adversary Behavior Analytics™ (ABA) enables automated response allowing IR teams to react to malicious activity in near real time. ABA Data Science algorithms leverage deception events and other data available in Enterprise security solutions (SIEM, Privileged User Management systems, etc.) to deliver valuable intelligence around adversary tools, tactics, procedures, latent vulnerabilities and more. Acalvio’s solution also includes smart blending of data and credential lures across enterprise servers and endpoints. These lures both detect data theft and redirect attacks to Fluid Deception™ for engagement.

“Distributed deception platforms are now a viable option for enhancing detection within enterprise security programs”, according to Lawrence Pingree, Gartner Research Director.[1]

"Acalvio is entering a very exciting era of cybersecurity, and we are thrilled to have GV join our current roster of amazing investors and strategic partners. GV’s investment in Acalvio validates our vision, our differentiated technology and the attractive market opportunity," said Ram Varadarajan, CEO, Acalvio. "We are very excited to be partnering GV to deliver innovative solutions and compelling value to our customers”.


About Acalvio

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.  The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management.  Acalvio enriches its threat intelligence by data obtained from internal and partner eco-systems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation. The Silicon Valley based company is led by an experienced team with a track record of innovation and market leadership and backed by marquee investors. For more information on Acalvio, please visit http://acalvio.com/ and follow the company on Twitter at @AcalvioTech and on LinkedIn.

[1] Gartner, Competitive Landscape: Distributed Deception Platforms, 2016, Lawrence Pingree, August 4, 2016

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-12
A SQL Injection vulnerability in get_topic_info() in sys/CODOF/Forum/Topic.php in Codoforum before 4.9 allows remote attackers (pre-authentication) to bypass the admin page via a leaked password-reset token of the admin. (As an admin, an attacker can upload a PHP shell and execute remote code on the...
PUBLISHED: 2021-05-12
An issue was discovered in Wind River VxWorks 7. The memory allocator has a possible integer overflow in calculating a memory block's size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.
PUBLISHED: 2021-05-12
Privilege Escalation vulnerability in the File Lock component of McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by manipulating a symbolic link in the IOTL interface.
PUBLISHED: 2021-05-12
Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by impersonating a client token which could lead to the bypassing of MTP self-defense.
PUBLISHED: 2021-05-12
By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitra...